-
1
Evading control flow graph based GNN malware detectors via active opcode insertion method with maliciousness preserving
Published 2025-03-01Subjects: Get full text
Article -
2
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01Subjects: “…control flow graph…”
Get full text
Article -
3
Unveiling Hidden Structures: Multi-Platform IoT Malware Analysis Using Graph Embeddings
Published 2025-01-01Subjects: “…Control-flow graph…”
Get full text
Article -
4
Code vulnerability detection method based on graph neural network
Published 2021-06-01Subjects: Get full text
Article -
5
Method of Monitoring Correctness of Execution of Processes in Operating Systems by Control of Dimensional Systems of Variables
Published 2024-07-01Subjects: Get full text
Article